Matches in SemOpenAlex for { <https://semopenalex.org/work/W2608341730> ?p ?o ?g. }
Showing items 1 to 66 of
66
with 100 items per page.
- W2608341730 endingPage "106" @default.
- W2608341730 startingPage "81" @default.
- W2608341730 abstract "ContentsAbstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684.2 Android High-Level Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694.3 Privacy Flaws in Mobile World . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714.4 Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744.4.1 Risk Analysis and App Reputation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744.4.2 App Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764.4.2.1 Static Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764.4.2.2 Dynamic Run-Time Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 774.4.3 Information Flow Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 784.4.4 Specifying and Enforcing Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804.4.4.1 Static Policy Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804.4.4.2 Monitoring Access to Sensitive Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814.4.4.3 Run-Time Policy Enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814.4.4.4 Privilege Escalation-Focused Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834.4.5 Privacy-by-Design Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844.5 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87AbstractMobile platforms, such as Android, iOS, and Windows, are gaining more and more relevancewithin end users’ applications, thanks to their usability, flexibility, and low cost. As a result, mobileInternet traffic is about to overwhelm landline traffic. Mobile platforms do not only provide endusers with services similar to legacy computers but also extend their experiences exploiting theadditional hardware features (e.g., sensors) incorporated in the mobile device, without the needof supplementary devices. Moreover, mobile devices are becoming the sources and repositories ofsensitive information, from running performances to positioning data, from travel information tofriendship preferences, from personal photos to financial data, and so on." @default.
- W2608341730 created "2017-05-05" @default.
- W2608341730 creator A5011049933 @default.
- W2608341730 creator A5029000210 @default.
- W2608341730 creator A5047345306 @default.
- W2608341730 creator A5080813617 @default.
- W2608341730 creator A5081560576 @default.
- W2608341730 creator A5084435647 @default.
- W2608341730 date "2016-11-25" @default.
- W2608341730 modified "2023-09-23" @default.
- W2608341730 title "Dealing with User Privacy in Mobile Apps: Issues and Mitigation" @default.
- W2608341730 doi "https://doi.org/10.1201/9781315369648-5" @default.
- W2608341730 hasPublicationYear "2016" @default.
- W2608341730 type Work @default.
- W2608341730 sameAs 2608341730 @default.
- W2608341730 citedByCount "0" @default.
- W2608341730 crossrefType "journal-article" @default.
- W2608341730 hasAuthorship W2608341730A5011049933 @default.
- W2608341730 hasAuthorship W2608341730A5029000210 @default.
- W2608341730 hasAuthorship W2608341730A5047345306 @default.
- W2608341730 hasAuthorship W2608341730A5080813617 @default.
- W2608341730 hasAuthorship W2608341730A5081560576 @default.
- W2608341730 hasAuthorship W2608341730A5084435647 @default.
- W2608341730 hasConcept C108827166 @default.
- W2608341730 hasConcept C123201435 @default.
- W2608341730 hasConcept C136764020 @default.
- W2608341730 hasConcept C144133560 @default.
- W2608341730 hasConcept C2988145974 @default.
- W2608341730 hasConcept C38652104 @default.
- W2608341730 hasConcept C41008148 @default.
- W2608341730 hasConceptScore W2608341730C108827166 @default.
- W2608341730 hasConceptScore W2608341730C123201435 @default.
- W2608341730 hasConceptScore W2608341730C136764020 @default.
- W2608341730 hasConceptScore W2608341730C144133560 @default.
- W2608341730 hasConceptScore W2608341730C2988145974 @default.
- W2608341730 hasConceptScore W2608341730C38652104 @default.
- W2608341730 hasConceptScore W2608341730C41008148 @default.
- W2608341730 hasLocation W26083417301 @default.
- W2608341730 hasOpenAccess W2608341730 @default.
- W2608341730 hasPrimaryLocation W26083417301 @default.
- W2608341730 hasRelatedWork W1267541009 @default.
- W2608341730 hasRelatedWork W1574540240 @default.
- W2608341730 hasRelatedWork W1849858708 @default.
- W2608341730 hasRelatedWork W2023058619 @default.
- W2608341730 hasRelatedWork W2079919685 @default.
- W2608341730 hasRelatedWork W2406696674 @default.
- W2608341730 hasRelatedWork W2569115921 @default.
- W2608341730 hasRelatedWork W2602870819 @default.
- W2608341730 hasRelatedWork W2667185062 @default.
- W2608341730 hasRelatedWork W2732952538 @default.
- W2608341730 hasRelatedWork W2803624159 @default.
- W2608341730 hasRelatedWork W2955077107 @default.
- W2608341730 hasRelatedWork W3026064580 @default.
- W2608341730 hasRelatedWork W3027166605 @default.
- W2608341730 hasRelatedWork W3036610418 @default.
- W2608341730 hasRelatedWork W3085870114 @default.
- W2608341730 hasRelatedWork W3167939159 @default.
- W2608341730 hasRelatedWork W3169504548 @default.
- W2608341730 hasRelatedWork W2188570983 @default.
- W2608341730 hasRelatedWork W2595022186 @default.
- W2608341730 isParatext "false" @default.
- W2608341730 isRetracted "false" @default.
- W2608341730 magId "2608341730" @default.
- W2608341730 workType "article" @default.